• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,947
Next 10 →

Transforming Data to Satisfy Privacy Constraints

by Vijay S. Iyengar , 2002
"... Data on individuals and entities are being collected widely. These data can contain information that explicitly identifies the individual (e.g., social security number). Data can also contain other kinds of personal information (e.g., date of birth, zip code, gender) that are potentially identifying ..."
Abstract - Cited by 250 (0 self) - Add to MetaCart
of preserving privacy for the specified usage. In particular, we investigate the privacy transformation in the context of data mining applications like building classification and regression models. Second, our work improves on previous approaches by allowing more flexible generalizations for the data. Lastly

Maintaining Data Privacy in Association Rule Mining

by Shariq Rizvi, Jayant R. Haritsa - In Proceedings of the 28th VLDB Conference, Hong Kong , 2002
"... Data mining services require accurate input data for their results to be meaningful, but privacy concerns may influence users to provide spurious information. We investigate here, with respect to mining association rules, whether users can be encouraged to provide correct information by ensuri ..."
Abstract - Cited by 171 (5 self) - Add to MetaCart
Data mining services require accurate input data for their results to be meaningful, but privacy concerns may influence users to provide spurious information. We investigate here, with respect to mining association rules, whether users can be encouraged to provide correct information

E-privacy in 2nd Generation E-Commerce: Privacy Preferences Versus actual Behavior

by Sarah Spiekermann, Jens Grossklags, Bettina Berendt , 2001
"... As electronic commerce environments become more and more interactive, privacy is a matter of increasing concern. Many surveys have investigated households' privacy attitudes and concerns, revealing a general desire among Internet users to protect their privacy. To complement these questionnaire ..."
Abstract - Cited by 152 (20 self) - Add to MetaCart
As electronic commerce environments become more and more interactive, privacy is a matter of increasing concern. Many surveys have investigated households' privacy attitudes and concerns, revealing a general desire among Internet users to protect their privacy. To complement

Information Privacy Concerns, Procedural Fairness and Impersonal Trust: An Empirical Investigation

by Mary Culnan, Pamela K Armstrong , 1997
"... This research addresses the tensions that arise between the collection and use of personal information that people provide in the course of most consumer transactions, and privacy. In today's electronic world, the competitive strategies of successful firms increasingly depend on vast amounts of ..."
Abstract - Cited by 116 (0 self) - Add to MetaCart
This research addresses the tensions that arise between the collection and use of personal information that people provide in the course of most consumer transactions, and privacy. In today's electronic world, the competitive strategies of successful firms increasingly depend on vast amounts

Looking at, looking up or keeping up with people?: Motives and use of Facebook

by Adam N. Joinson - In Proc. CHI 2008, ACM Press , 2008
"... This paper investigates the uses of social networking site Facebook, and the gratifications users derive from those uses. In the first study, 137 users generated words or phrases to describe how they used Facebook, and what they enjoyed about their use. These phrases were coded into 46 items which w ..."
Abstract - Cited by 219 (7 self) - Add to MetaCart
were completed by 241 Facebook users in Study 2. Factor analysis identified seven unique uses and gratifications: social connection, shared identities, content, social investigation, social network surfing and status updating. User demographics, site visit patterns and the use of privacy settings were

Android permissions demystified

by Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, David Wagner - In CCS’11
"... Android provides third-party applications with an extensive API that includes access to phone hardware, settings, and user data. Access to privacy- and security-relevant parts of the API is controlled with an install-time application permission system. We study Android applications to determine whet ..."
Abstract - Cited by 225 (12 self) - Add to MetaCart
Android provides third-party applications with an extensive API that includes access to phone hardware, settings, and user data. Access to privacy- and security-relevant parts of the API is controlled with an install-time application permission system. We study Android applications to determine

Providing Database as a Service

by Hakan Hacigumus, Bala Iyer, Sharad Mehrotra - In Proc. of ICDE , 2002
"... In this paper, we explore a new paradigm for data management in which a third party service provider hosts "database as a service" providing its customers seamless mechanisms to create, store, and access their databases at the host site. Such a model alleviates the need for organizations t ..."
Abstract - Cited by 222 (5 self) - Add to MetaCart
to data, an infrastructure to guarantee data privacy, and user interface design for such a service. These issues are investigated in the study. We identify data privacy as a particularly vital problem and propose alternative solutions based on data encryption. This paper is meant as a challenges paper

Predicting tie strength with social media

by Eric Gilbert, Karrie Karahalios - In Proceedings of the Conferece on Human Factors in Computing Systems (CHI’09 , 2009
"... Social media treats all users the same: trusted friend or total stranger, with little or nothing in between. In reality, relationships fall everywhere along this spectrum, a topic social science has investigated for decades under the theme of tie strength. Our work bridges this gap between theory an ..."
Abstract - Cited by 218 (6 self) - Add to MetaCart
Social media treats all users the same: trusted friend or total stranger, with little or nothing in between. In reality, relationships fall everywhere along this spectrum, a topic social science has investigated for decades under the theme of tie strength. Our work bridges this gap between theory

Protecting privacy against location-based personal identification

by Claudio Bettini, X. Sean Wang, Sushil Jajodia - In 2nd VLDB Workshop SDM , 2005
"... Abstract. This paper presents a preliminary investigation on the privacy issues involved in the use of location-based services. It is argued that even if the user identity is not explicitly released to the service provider, the geo-localized history of user-requests can act as a quasi-identifier and ..."
Abstract - Cited by 109 (8 self) - Add to MetaCart
Abstract. This paper presents a preliminary investigation on the privacy issues involved in the use of location-based services. It is argued that even if the user identity is not explicitly released to the service provider, the geo-localized history of user-requests can act as a quasi

Investigating privacy in an ambient world

by Linda Little , Pam Briggs
"... ABSTRACT Ambient Intelligence (AmI) and ubiquitous computing allow us to consider a future where computation is embedded into our daily social lives. This vision raises its own important questions and augments the need to understand how people will achieve and maintain privacy. As a result, we have ..."
Abstract - Add to MetaCart
ABSTRACT Ambient Intelligence (AmI) and ubiquitous computing allow us to consider a future where computation is embedded into our daily social lives. This vision raises its own important questions and augments the need to understand how people will achieve and maintain privacy. As a result, we
Next 10 →
Results 1 - 10 of 1,947
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University